Author of the publication

Vale: Verifying High-Performance Cryptographic Assembly Code.

, , , , , , , , and . USENIX Security Symposium, page 917-934. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tools and Behavioral Abstraction: A Direction for Software Engineering.. The Future of Software Engineering, page 115-124. Springer, (2010)Festschrift for Bertrand Meyer on the Occasion of His 60th Birthday, November 2010.Efficient weakest preconditions.. Inf. Process. Lett., 93 (6): 281-288 (2005)Verified Calculations., and . VSTTE, volume 8164 of Lecture Notes in Computer Science, page 170-190. Springer, (2013)Specifying and verifying software.. ASE, page 2. ACM, (2007)A Logic of Object-Oriented Programs., and . Verification: Theory and Practice, volume 2772 of Lecture Notes in Computer Science, page 11-41. Springer, (2003)An Extended Static Checker for Modular-3., and . CC, volume 1383 of Lecture Notes in Computer Science, page 302-305. Springer, (1998)A Basis for Verifying Multi-threaded Programs., and . ESOP, volume 5502 of Lecture Notes in Computer Science, page 378-393. Springer, (2009)An Assertional Proof of the Stability and Correctness of Natural Mergesort., and . ACM Trans. Comput. Log., 17 (1): 6 (2015)Compiling Hilbert's epsilon operator.. LPAR (short papers), volume 35 of EPiC Series in Computing, page 106-118. EasyChair, (2015)Staged program development.. SPLASH, page 3-4. ACM, (2012)